> People who advocate paying the higher cost ahead of time to perfectly type the entire data structure AND propose a process to do perform version updates to sync client/server are going to lose most of the time.
that's true. But people also rather argue about security vulnerabilities than getting it right from the get-go. Why spend an extra 15 mins effort during design when you can spend 3 months revisiting the ensuing problem later.
> The culture of AI is imperialist and seeks to expand the kingdom of the machine. The AI
community is well organized and well funded, and its culture fits its dreams: it has high
priests, its greedy businessmen, its canny politicians. The U.S. Department of Defense
is behind it all the way. And like the communists of old, AI scientists believe in their
revolution; the old myths of tragic hubris don’t trouble them at all.
-- Tony Solomonides and Les Levidow (1985, pp. 13–14)
this article feels like the authors were trying to pander to those few people working in AI research telling them how crucial philosophy is "to the future of humanity". When in reality it has always been important long before AI came along and not only for AI but also for anyone working in Tech or any subject in Tech. so it is nothing more than news-jacking (or buzzword jacking) of a topic that has always been important but probably not in the isolated / cherry-picked manner that it is being done (isolating the topic to AI, or Nietzsche).
And the only thing that this article highlights if anything, is that we we should have never defunded the humanities.
> hey, tell me what are some of the recent laws in Germany that make it a crime to call politicians out on social media
in Germany, calling a politician certain derogatory names or mocking them in a way that is considered a "public insult" (and reasonably likely to impair their ability to do their job) can lead to criminal liability under §188 StGB. The scope includes online social media posts. The trend of enforcement appears to be increasing.
Section 188 of the German Criminal Code "insulting public officials" - This section makes it a crime to insult ("Beleidigung"), defame ("Verleumdung" or slander ("Üble Nachrede" a person in public life (politicians at all levels) if the insult is "likely to significantly impair the ability of the person concerned to perform their public duties"
Network Enforcement Act (NetzDG) – social media platform liability; It obliges large social-media platforms operating in Germany to remove "clearly illegal" content quickly (within 24 h) and illegal content within 7 days, report transparency, store removed content for 10 weeks. This law creates an environment in which platform-moderation is under pressure. Content that may lead to criminal liability (such as insults under §188) may be more likely to be flagged/removed by platforms.
General "insult" (§185 StGB), "slander" (§186 StGB) and "defamation" (§187 StGB) apply to any person, not just public officials. Conditions and penalties are higher under §188 when public officials are involved. Also, laws on dissemination of personal data (doxing) (§126a StGB) were enacted in 2021. While not specific to insulting politicians, they add further online-speech liabilities
LMAO. Kevin Beaumont roasted that "80% of ransomware attacks are now powered by AI" paper² so hard that MIT appears to have deleted it (link was working as recently as a day ago). The paper was so absurd I burst out laughing at the title. Then when I read their methodology I laughed even harder.
They basically took a sample of ransomware attacks then tried to figure out how many "used AI". Their definition of "used AI" was basically "the threat actors are known to use AI for anything in any capacity".
Their definition of "AI powered" was already dubious. But what's even more hilarious, they never even explained how they concluded that a threat actors was "using AI".
Many of the threat actors they cited as "using AI" were ones I personally tracked as part of my day job and can testify did not use AI.
Furthermore, they claim to have analyzed attacks across 2023-2024, but several ransomware groups they cited as "definitely using AI" died out prior to 2023. One even died out before the first GPT model was released.
While this specific claim and incident is especially egregious, it's only a small part of a growing trend. For a while now, tech companies have been disguising marketing blog posts as academic research, sometimes even publishing it via respected journals.
It's very hard to get people to take cybersecurity seriously when we have a bunch of cracked out corporate marketing bozos posting nonsense "research" to scientific journals.
I'd go back to the office in a heartbeat provided it was an actual office. And not an "open-office" layout, that people are forced to try to concentrate with all the noise and people passing behind them constantly.
The agile treadmill (with PM's breathing down our necks) and features getting planned and delivered in 2 week-sprints, has also reduced our ability to just do something we feel needs getting done. Today you go to work to feed several layers of incompetent managers - there is no room for play, or for creativity. At least in most orgs I know.
I think innovation (or even joy of being at work) needs more than just the office, or people, or a canteen, but an environment that supports it.
Personally, I try to under-promise on what I think I can do every sprint specifically so I can spend more time mentoring more junior engineers, brainstorming random ideas, and working on stuff that nobody has called out as something that needs working on yet.
Basically, I set aside as much time as I can to squeeze in creativity and real engineering work into the job. Otherwise I'd go crazy from the grind of just cranking out deliverables
We have an open office surrounded by "breakout offices". I simply squat in one of the offices (I take most meetings over video chat), as do most of the other principals. I don't think I could do my job in an office if I couldn't have a room to work in most of the time.
As for agile: I've made it clear to my PMs that I generally plan on a quarterly/half year basis and my work and other people's work adheres to that schedule, not weekly sprints (we stay up to date in a slack channel, no standups)
the new Defender got to be the worst Land Rover ever built. It has terrible off-road capability even compared to the other (non Defender models like the Range). JLR alienated their entire existing Defender drivers where hardly any of them would buy this new model.
Granted, they also alienated their user base when the traditional TDI was replaced with the TD5 and then more alienation when they introduced the TD4.
But the latest thing (L663) has nothing in common with any of the previous models. (probably due to pedestrian safety laws becoming more strict)
> the new Defender got to be the worst Land Rover ever built
No it isn't. I own a 2022 D90 P300 with 18" wheels, coils, front jump seat, everything. It's been great for ~40,000 miles. I'm constantly on dirt and rocky roads here. It's never let me down.
They're used by tons of people for offroading and modified heavily as well, with companies like Sarek, Lucky8, etc.
The only people who hate on new Defenders are the ones that love the ~25 year old versions with 200,000 miles, tons of rust, a diesel engine that can barely make it to highway speeds, and spends more time in the garage every weekend than "exploring." But hey, they're cooler than us because they work on their cars and have a manual transmission.
Same. My in-laws are Toyota Land Cruiser people, heavily involved with the local clubs. FIL even runs their driver training programs. Was very anti us getting a Defender and said we'd regret it. When we did the training the main problem we had was getting it stuck, because part of the training was learning how to use a winch or straps to get yourself out when you're bogged. We were able to drive out of anything. Now his only criticism is it's not as much fun to drive because it takes less skill (which is exactly what I wanted. I want to get places, not necessarily challenge myself to get there though). It's also a much better finish than the Toyotas. It's not much more expensive than their latest fully optioned Land Cruiser, but everything about the inside of LC feels like it's not been updated since the late 90s. And plenty about it that actually feels cheap (and before anyone weighs in, not in a way that is designed to wear and tear. Just cheap and lazy).
The few annoyances we've had LR have resolved for us at zero cost, even when we were out of warranty.
Yup, the new Defender is amazing. I use mine as a daily driver and love it. You can drive 4,000 miles across country in comfort/luxury and then still have advanced off-roading capabilities in mud, sand, rocks, etc. It's the best of both worlds. All with a warranty.
What's funnier is most of the "new" Defender owners I meet love the old ones (including me, I miss driving manual.) It's the old owners that still seem to have an attitude (calling them "Pretenders", etc.)
The problem I see, is that while the electronic assists and auto gearbox are great in general and win over the older generation everytime in comparisons, having a mild electrical problem or a malfunction in any electronic module would render it basically unusable.
My father told me many stories about the old Land Rovers they had in the military service in Spain. One time, he successfully climbed a hill with two captains after snapping the back axle (the one coming from the transfer case), by locking the differential. These new machines rely too much on electronics without backup, I believe.
Also, and this is fully my opinion, I would never take an automatix off-road.
> The breach was enabled through stolen Jira credentials harvested via Infostealer malware, a known hallmark of HELLCAT’s operations. The exposed data includes development logs, tracking information, source code, and a large employee dataset with usernames, email addresses, display names, and time zones. The presence of verified employee information from JLR’s global workforce raises significant concerns about identity theft and targeted phishing campaigns.
then
> the JLR breach escalated when a second threat actor, “APTS,” appeared on DarkForums on March 14, 2025. APTS claimed to have exploited Infostealer credentials dating back to 2021, belonging to an employee who held third-party access to JLR’s Jira server. Using these compromised credentials, the actor gained entry and shared a screenshot of a Jira dashboard as proof. APTS also leaked an additional tranche of sensitive data, estimated at around 350 GB, which contained information not included in Rey’s original dump, further amplifying the scale and severity of the breach.
that's true. But people also rather argue about security vulnerabilities than getting it right from the get-go. Why spend an extra 15 mins effort during design when you can spend 3 months revisiting the ensuing problem later.
reply